Trojan Remover was written to aid in the removal of Trojan Horses from a computer when standard anti-virus software has either failed to detect the Trojan Horse or is unable to effectively eliminate it.

The majority of Virus and Trojan scanners are well able to detect malicious Trojan Horses but are not very efficient in removing them if they have already been triggered. Trojan Remover was written specifically to carry out such a removal without the user having to manually edit system files, including the Windows Registry.

Trojan Remover also removes the additional system modifications some Trojans carry out which are ignored by most other Virus and Trojan scanners.

What Trojan Remover Will Do
-----------------------------------------------

a) Trojan Remover will examine all the system files, including the Windows Registry and determine the programs and files that are loaded at boot time. The majority of Trojan Horses (once active) are loaded this way. Trojan Remover can be set to carry out these checks automatically each time the computer is started.

b) Trojan Remover will attempt to identify the file in question. If it is a known system file required at start up a note will be placed in the logfile. If the name is identical to a known Trojan Horse name a warning will be issued.

c) For each identified Trojan Horse, or unrecognised program or file, Trojan Remover will pop up a screen showing the file location and name, offer to remove its reference from the system files and allow you to rename the file if you request it.

d) If the file being called exists on the system, it will be scanned to see if it contains a Remote Access Trojan. If one is discovered, Trojan Remover will issue an alert.

e) Trojan Remover will on request remove all the modifications carried out by those Trojan Horses which make system changes.

f) Most modern Trojan Horses are activated as soon as Windows starts thus making their renaming more difficult. Trojan Remover can, on request, reboot the system and rename these files before Windows restarts. When this option is chosen, the Windows system files are set to read-only to prevent re-infection. The read-only attribute is removed when Trojan Remover has restarted the system.

g) Trojan Remover will examine the autoexec.bat file to search for suspect DELETE, DELTREE or FORMAT command lines. It will also search for and disable if necessary the entries that KAKWorm make in this file.

h) Trojan Remover will write information to a logfile each time a new Scan is activated. This logfile will contain detailed information on which system areas were checked, which programs/files are loaded at boot time and what (if any) actions were taken. The logfile is viewable from the Main Menu.